Alexandre Bartel

ORCID: 0000-0003-1383-0372
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Digital and Cyber Forensics
  • Security and Verification in Computing
  • Software Testing and Debugging Techniques
  • Network Security and Intrusion Detection
  • Web Application Security Vulnerabilities
  • Software Engineering Research
  • Multimedia Communication and Technology
  • Internet Traffic Analysis and Secure E-voting
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Scientific Computing and Data Management
  • Software Reliability and Analysis Research
  • Advanced Software Engineering Methodologies
  • Privacy, Security, and Data Protection
  • Colonialism, slavery, and trade
  • Caching and Content Delivery
  • Spam and Phishing Detection
  • Green IT and Sustainability
  • Radiation Effects in Electronics
  • Distributed and Parallel Computing Systems
  • Digital Platforms and Economics
  • Model-Driven Software Engineering Techniques
  • Web Data Mining and Analysis
  • Psychoanalysis and Psychopathology Research
  • Simulation Techniques and Applications

Umeå University
2019-2025

University of Luxembourg
2011-2022

University of Copenhagen
2021

Technical University of Darmstadt
2015-2016

Scalable Network Technologies (United States)
2012

Today's smartphones are a ubiquitous source of private and confidential data. At the same time, smartphone users plagued by carelessly programmed apps that leak important data accident, malicious exploit their given privileges to copy such intentionally. While existing static taint-analysis approaches have potential detecting leaks ahead all for Android use number coarse-grain approximations can yield high numbers missed false alarms.

10.1145/2594291.2594299 article EN 2014-05-13

Today's smartphones are a ubiquitous source of private and confidential data. At the same time, smartphone users plagued by carelessly programmed apps that leak important data accident, malicious exploit their given privileges to copy such intentionally. While existing static taint-analysis approaches have potential detecting leaks ahead all for Android use number coarse-grain approximations can yield high numbers missed false alarms. In this work we thus present FlowDroid, novel highly...

10.1145/2666356.2594299 article EN ACM SIGPLAN Notices 2014-06-05

Shake Them All is a popular Wallpaper application exceeding millions of downloads on Google Play. At installation, this given permission to (1) access the Internet (for updating wallpapers) and (2) use device microphone (to change background following noise changes). With these permissions, could silently record user conversations upload them remotely. To give more confidence about how actually processes what it records, necessary build precise analysis tool that tracks flow any sensitive...

10.5555/2818754.2818791 article EN International Conference on Software Engineering 2015-05-16

Shake Them All is a popular "Wallpaper" application exceeding millions of downloads on Google Play. At installation, this given permission to (1) access the Internet (for updating wallpapers) and (2) use device microphone (to change background following noise changes). With these permissions, could silently record user conversations upload them remotely. To give more confidence about how actually processes what it records, necessary build precise analysis tool that tracks flow any sensitive...

10.1109/icse.2015.48 article EN 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2015-05-01

This paper introduces Dexpler, a software package which converts Dalvik bytecode to Jimple. Dexpler is built on top of Dedexer and Soot. As Jimple Soot's main internal rep- resentation code, the can be manipu- lated with any based tool, for instance performing point-to or flow analysis.

10.1145/2259051.2259056 preprint EN 2012-06-11

In the permission-based security model (used e.g. in Android and Blackberry), applications can be granted more permissions than they actually need, what we call a "permission gap". Malware leverage unused for achieving their malicious goals, instance using code injection. this paper, present an approach to detecting permission gaps static analysis. Using our tool on dataset of applications, found out that non negligible part suffers from gaps, i.e. does not use all declare.

10.1145/2351676.2351722 preprint EN 2012-09-03

Static analysis has been successfully used in many areas, from verifying mission-critical software to malware detection. Unfortunately, static often produces false positives, which require significant manual effort resolve. In this paper, we show how overlay a probabilistic model, trained using domain knowledge, on top of results, order triage results. We apply idea analyzing mobile applications. Android application components can communicate with each other, both within single applications...

10.1145/2837614.2837661 article EN 2016-01-07

A common security architecture is based on the protection of certain resources by permission checks (used e.g., in Android and Blackberry). It has some limitations, for instance, when applications are granted more permissions than they actually need, which facilitates all kinds malicious usage (e.g., through code injection). The analysis permission-based framework requires a precise mapping between API methods require. In this paper, we show that naive static fails miserably applied with...

10.1109/tse.2014.2322867 article EN IEEE Transactions on Software Engineering 2014-05-09

Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-component data-flow analysis to detect leaks between components of applications. Unlike all current approaches, our tool, called IccTA, propagates the context components, which improves precision analysis. IccTA outperforms other available tools by reaching a 95.0% and recall 82.6% on DroidBench. Our approach detects 147 based in 14 set 3000 real-world with 88.4%. With help ApkCombiner, is...

10.48550/arxiv.1404.7431 preprint EN cc-by arXiv (Cornell University) 2014-01-01

We present a growing collection of Android apps collected from several sources, including the official Google Play app market and various metadata those aiming at facilitating Android-relevant research works. Our dataset by far has over five million 20 types such as VirusTotal reports. objective collecting this is to contribute ongoing efforts, well enable new potential topics on Apps. By releasing our set community, we also aim encouraging fellow researchers engage in reproducible...

10.48550/arxiv.1709.05281 preprint EN other-oa arXiv (Cornell University) 2017-01-01

We present PCLeaks, a tool based on inter-component communication (ICC) vulnerabilities to perform data-flow analysis Android applications find potential component leaks that could potentially be exploited by other components. To evaluate our approach, we run PCLeaks 2000 apps randomly selected from the Google Play store. reports 986 in 185 apps. For each leak reported PCLeaksValidator automatically generates an app which tries exploit leak. By manually running subset of generated apps, 75%...

10.1109/trustcom.2014.50 preprint EN 2014-09-01

Inter-Component Communication (ICC) is a key mechanism in Android. It enables developers to compose rich functionalities and explore reuse within across apps. Unfortunately, as reported by large body of literature, ICC rather "complex largely unconstrained", leaving room lack precision apps modeling. To address the challenge tracking ICCs apps, state art static approaches such EPICC, ICCTA AMANDROID have focused on documented framework methods (e.g., startActivity) build their approaches. In...

10.1109/icse43902.2021.00126 preprint EN 2021-05-01

When created, the Java platform was among first runtimes designed with security in mind. Yet, numerous versions were shown to contain far-reaching vulnerabilities, permitting denial-of-service attacks or even worse allowing intruders bypass runtime's sandbox mechanisms, opening host system up many kinds of further attacks.

10.1145/2976749.2978361 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2016-10-24

Nowadays, an increasing number of applications uses deserialization. This technique, based on rebuilding the instance objects from serialized byte streams, can be dangerous since it open application to attacks such as remote code execution (RCE) if data deserialize is originating untrusted source. Deserialization vulnerabilities are so critical that they in OWASP's list top 10 security risks for web applications. mainly caused by faults development process and flaws their dependencies, i.e.,...

10.1145/3554732 article EN ACM Transactions on Software Engineering and Methodology 2022-08-05

Inter-app communication is a mandatory and security-critical functionality of operating systems, such as Android. On the application level, Android implements this facility through Intents, which can also transfer non-primitive objects using Java's Serializable API. However, API has long history deserialization vulnerabilities, specifically gadget chains. Research endeavors have been heavily directed towards detection chains on Java platform. Yet, there little knowledge about existence...

10.48550/arxiv.2502.08447 preprint EN arXiv (Cornell University) 2025-02-12

We discuss the capability of a new feature set for malware detection based on potential component leaks (PCLs). PCLs are defined as sensitive data-flows that involve Android inter-component communications. show common in apps and malicious applications indeed manipulate significantly more than benign apps. Then, we evaluate machine learning-based approach relying PCLs. Experimental validations high performance identifying malware, demonstrating can be used discriminating from

10.1109/qrs.2015.36 article EN 2015-08-01
Coming Soon ...